Font Size: a A A

Research On Verifiable Polynomial Outsourcing Computing Protocol

Posted on:2019-04-20Degree:MasterType:Thesis
Country:ChinaCandidate:F F ZhengFull Text:PDF
GTID:2428330548973751Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the development of information technology,the issue of cloud security is becoming more and more concerned.Outsourcing computing is a branch of cloud computing,which enables users with limited computing power,limited storage but with complex computing tasks to deliver complex computing tasks to cloud servers with powerful computing power.However,while outsourcing computing brings convenience to users,it inevitably brings new security problems and challenges.Polynomial operation is ubiquitous in scientific research and daily life.It is the important foundation of matrix operation,set operation and so on.At present,there are more and more researches on polynomial outsourcing computing protocol,and polynomial outsourcing computing protocol plays an important role in information system query,keyword retrieval and so on.In this paper,we study the verifiable and outsourced computing protocols for polynomial function and matrix polynomial,and the protocols proposed in this paper are based on a single untrusted cloud server,the main work of this thesis is as follows:1.The paper studies the existing matrix outsourcing protocol,modular power outsourcing protocol and polynomial outsourcing protocol,summarizes the limitations of these three kinds of protocols,especially summarizes the existing polynomial outsourcing protocol.The protocol in this paper are based on the verifiable computation.Using blind cryptographic techniques,a verifiable polynomial function outsourcing computing protocol is proposed.The user blinds the input function and sends it to the cloud server,from which the cloud server can not obtain any information about the function and the output result.Then,the security of the protocol is analyzed,which proves that the protocol can ensure the privacy of user information and reduce the computing cost of users.2.Inspired by the verifiable polynomial function outsourcing protocol,a verifiable matrix polynomial outsourcing computing protocol is proposed.Similarly,the protocol uses blind cryptographic techniques to hide the user's matrix polynomial and output information.Then,the security of the protocol is analyzed,which proves that the protocol can ensure the privacy of user information and reduce the computing cost of users.3.A publicly verifiable polynomial outsourced computing protocol is proposed,which is constructed by using bilinear maps.It can protect the privacy of user's input information,input function and output information.In this protocol,the user can reject the error result returned by the cloud server with a high probability.The security proof is based on the assumption of DDH and SDDH difficult problems.
Keywords/Search Tags:cloud computing, outsourcing computing, polynomial function, matrix polynomial, verifiability
PDF Full Text Request
Related items